Search for "Jong-Hoon Lee" returned 553 results

How risky is the software you use?
58 min

How risky is the software you use?

CITL: Quantitative, Comparable Software Risk Reporting

To Protect And Infect
45 min

To Protect And Infect

The militarization of the Internet

Quantum Cryptography
60 min

Quantum Cryptography

from key distribution to position-based cryptography

How to Build a Mind
55 min

How to Build a Mind

Artificial Intelligence Reloaded

Tactical Embodiment
54 min

Tactical Embodiment

Activism and Performance In Hostile Spaces Online

SD-WAN a New Hop
49 min

SD-WAN a New Hop

How to hack software defined network and keep your sanity?

Drones
60 min

Drones

Autonomous flying vehicles, where are we and where are we…

Wifibroadcast
42 min

Wifibroadcast

How to convert standard wifi dongles into digital broadcast…

TamaGo - bare metal Go framework for ARM SoCs.
59 min

TamaGo - bare metal Go framework for ARM SoCs.

Reducing the attack surface with pure embedded Go.

Protecting Your Privacy at the Border
58 min

Protecting Your Privacy at the Border

Traveling with Digital Devices in the Golden Age of…

Opening Closed Systems with GlitchKit
60 min

Opening Closed Systems with GlitchKit

'Liberating' Firmware from Closed Devices with Open Source…

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking
31 min

Unleash your smart-home devices: Vacuum Cleaning Robot Hacking

Why is my vacuum as powerful as my smartphone?

Fuck Dutch mass-surveillance: let's have a referendum!
32 min

Fuck Dutch mass-surveillance: let's have a referendum!

Forcing the Netherlands to publicly debate privacy and the…